Challenge |
Ref. # |
Solution |
Advantage / Disadvantage |
Security |
[63] |
A regulatory framework equivalent to Health Insurance Portability and Accountability Act (HIPPA) for smart grid privacy and consumer fraud problems |
Would provide clear legislative and legal avenues should problems occur / Bureaucracy would not solve some of the problems provided |
[64] |
A distributed incremental aggregation framework for smart meters to protect users’ privacy by using homomorphic encryption |
Unidirectional functionality not allowing for passing information back to a specific unit; Time delay of communication in possible real time operations; Does not look into malicious or fraudulent data acquisition. |
[65] |
Using a battery connected between the home and the grid so that anyone looking at the power usage will see a battery charging and not the current profiles of the actual items using power |
Makes power usage indistinguishable from one day to the next; Overhead of installation and usage and wear and tear costs of a battery system in a home; Difficult to hide high power usage items such as AC, washer, dryer, etc. |
[66] |
Privacy vs utility: How to get the best of both worlds without sacrificing too much on either side. |
Balanced framework / Gives up privacy information of high power item usage as well as the price of the battery |
[67] |
Targeted attacks vs random attacks to smart grid: Building faster and more resilient networks to fend off attacks through the communication networks |
Faster networks would entail creating a faster protocol to transfer information; Faster connections mean less encryption or protections increasing privacy and attacker problems. |
[69] |
Load Redistribution (LR) attacks: Using Multi-start Benders decomposition to find the most damaging immediate attack. |
Good attack prevention strategy for this specific type of attack |
[70] |
Proposing strategies to detect and localize malicious attacks |
Capable of detecting attacks on multiple locations / The number of locations being attacked expands computation. |
Quality |
[75] |
The data mining-based and the state estimation-based electricity consumption outlier data detection methods |
Data mining algorithms are faster and better at detecting outliers than traditional methods / Does not account for missing or redundant data. |
[82] |
Developing a data mining prototype system (RMINE) for fault diagnosis or system malfunction detection |
Capable of obtaining the minimal diagnostic rule set to derive a logical decision in assisting maintenance engineers to diagnose faults |
[86] |
Introducing a new class of attacks, called false data injection attacks against monitoring of PMUs or smart grid sensors for state estimation |
N/A |
Processing location |
[88] |
Using embedded neural networks to analyze edge-based load information. |
Offers privacy concerns by identifying what is being used in a specific area. |
[89] |
Creating a micro grid out of a smart home |
Makes a good framework out of the smart home / Lack of intelligent connections to the grid makes it unusable. |
[90] |
Applying edge computing in the Power Internet of Things (PIOT), such as in monitoring transmission lines, managing smart homes, etc. |
Bandwidth issues, locational solutions |